This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيد
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
اقرأ المزيد
This book summarizes important developments in telecommunications, including SS7 over IP, with a focus on SS7 network reliability.
اقرأ المزيد
With the advent of the Digital Library initiative, web document processing and biometric aspects of digital document processing, ...
اقرأ المزيد
With the advent of the Digital Library initiative, web document processing and biometric aspects of digital document processing, ...
اقرأ المزيد
This book analyzes the dynamics and impacts of software development and discusses new institutional and economic changes ...
اقرأ المزيد
If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
اقرأ المزيد
This two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
اقرأ المزيد
This two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
اقرأ المزيد
This volume consists of three parts. The first part contains the papers/abstracts of the invited talks, the second part contains ...
اقرأ المزيد
This volume consists of three parts. The first part contains the papers/abstracts of the invited talks, the second part contains ...
اقرأ المزيد
This book constitutes the proceedings of the 17th International Conference on Distributed Computing and Internet Technology, ...
اقرأ المزيد
The book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
اقرأ المزيد
The book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
اقرأ المزيد
The book constitutes the refereed proceedings of the First International Conference on Distributed Computing in Sensor Systems, ...
اقرأ المزيد
The book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, ...
اقرأ المزيد
The book constitutes the refereed proceedings of the 4th International Conference on Distributed Computing in Sensor Systems, ...
اقرأ المزيد
There are many applications that require parallel and distributed processing to allow complicated engineering, business and ...
اقرأ المزيد
This publication discusses exclusionary rules in different criminal justice systems. It is based on the findings of a research ...
اقرأ المزيد